OtherPapers.com - Other Term Papers and Free Essays


1,196 Technology Essays: 271 - 300

Go to Page
  • Customer Management & Satisfaction Help to Achieve the Acceptance of Work

    Customer Management & Satisfaction Help to Achieve the Acceptance of Work

    Abstract: Sometimes customer doesn't eager to cooperate with new techonology provider because they're familiar with other product. In that case, it is very difficult to reach their trusworthiness. So proper & managable customer relation help to over this obstacle to reach the target. Keywords: customer satisfaction, Customer management Problem Behind

    Essay Length: 1,372 Words / 6 Pages
    Submitted: August 5, 2011
  • Customer Satisfaction of Grameen Phone Internet

    Customer Satisfaction of Grameen Phone Internet

    In the age of information technology, the mobile phone technology has dramatically changed the life style. It is argued by marketers that these new technologies have the capacity to enrich the lives and to improve it in many ways (Risto and Askegaard, 2002). This mobile has enriched the communication network

    Essay Length: 281 Words / 2 Pages
    Submitted: July 31, 2011
  • Customer Service Trends

    Customer Service Trends

    The first website I like is Chase.com which is really customer focused. The website has changed over the last couple of years. It is more interactive for the customer looking for credit card and the benefits of each card. It allows the customer to compare and pick the best card

    Essay Length: 1,057 Words / 5 Pages
    Submitted: May 16, 2013
  • Cvp and Break Even Analysis

    Cvp and Break Even Analysis

    CVP and Break-Even Analysis Snap Fitness - Estimation of Variable Costs Understanding the different costs associated with a business is essential to running and maintaining it. Each location of Snap Fitness will incur monthly estimated fixed costs of $4,000 for operating expenses and $2,000 to lease the fitness equipment (Kimmel,

    Essay Length: 1,181 Words / 5 Pages
    Submitted: March 17, 2013
  • Cyber Attacks

    Cyber Attacks

    Introduction: Since the BOOM of the Internet, in 1990's, the world has become more and more dependent on it. Today's businesses rely increasingly on corporate IT networks and their connection with the global Internet as the backbone of their sales, sourcing, operating, and financial systems. Food, water, and energy distribution

    Essay Length: 2,515 Words / 11 Pages
    Submitted: September 14, 2011
  • Cyber Crime

    Cyber Crime

    CYBERCRIME Cybercrime Student’s Name Institutional Affiliation Cybercrime Cyber crime is a transgression that is committed to a computer network or via the internet. It mainly involves systems and computers for cybercrime to operate. Cybercrime is an offense that illegally accesses one’s information unknowingly or manipulates information (Holt & Bossier, 2008).

    Essay Length: 666 Words / 3 Pages
    Submitted: February 11, 2016
  • Cyberbullying Case

    Cyberbullying Case

    Everyone has met a bully at some point during their life. Even though school bullies are usually associated with fists fights in the hallways, this is no longer the case in our modern society. Many bullies have now entered the world of cyberspace, and are able to attack their victims

    Essay Length: 1,137 Words / 5 Pages
    Submitted: January 18, 2012
  • Cyberbullying Case

    Cyberbullying Case

    Cyber bullying is a form of the traditional bullying, however more advanced in our day of technology. It can occur via the internet and social networking sites such as Facebook, MySpace, and Twitter. Email, chat sites, as well as email and text messaging through a mobile device are all considered

    Essay Length: 601 Words / 3 Pages
    Submitted: June 9, 2013
  • Cyberterrorism (dutch)

    Cyberterrorism (dutch)

    1. Inleiding In 1969 ontwikkelde de Advanced Research Projects Agency (ARPA) de eerste versie van het internet (Castells, 2001). Met de populariteitstoename van dit medium ontstaan ook nieuwe vormen van criminaliteit. Denk hierbij aan misbruik van de persoonlijke gegevens (identiteitsfraude), verspreiding en stimulering van kinderporno en het platleggen van netwerken

    Essay Length: 1,505 Words / 7 Pages
    Submitted: March 5, 2011
  • Cyborg Technology

    Cyborg Technology

    From the past, people use different kinds of machines to make their work easy. With the time machine has now become a part human life. This is the basic concept behind the Cyborg Technology. "Cyborg", a term that reflects the man-machine co-existence and which refers to a being with both

    Essay Length: 1,224 Words / 5 Pages
    Submitted: October 25, 2011
  • Daily Typing

    Daily Typing

    Daily Typing- Lesson #1 In the years to come, quality office workers with good basic skills will continue to be in high demand. Employers in most organizations will seek out employees who have a good knowledge base in English grammar and usage, an ability to speak and write well, and

    Essay Length: 281 Words / 2 Pages
    Submitted: September 2, 2011
  • Daimler Benz

    Daimler Benz

    Behind the disaster of the challenger space shuttle, some of the researchers found there was lack of communication between the engineers and the mangers. Some of them there was insufficient provision of upward communication outside the chain of command. There was also a suggestion that status differences between engineers and

    Essay Length: 310 Words / 2 Pages
    Submitted: August 3, 2011
  • Daleks and the Cybermen

    Daleks and the Cybermen

    Doomsday" is the thirteenth and final episode in the second series of the British science fiction television series Doctor Who. It was first broadcast on 8 July 2006 and is the conclusion of a two-part story; the first part, "Army of Ghosts", was broadcast on 1 July 2006. The two-part

    Essay Length: 1,140 Words / 5 Pages
    Submitted: July 8, 2011
  • Dangerous World Beyond

    Dangerous World Beyond

    Dangerous World Beyond The Digital Age has brought us new technology that is mind blowing. Our generation is privileged enough to be growing up with all this technology. The most resourceful, entertaining, and inspiring piece of technology that came out of this age is the Internet. The MERRIAM-WEBSTER dictionary defines

    Essay Length: 1,440 Words / 6 Pages
    Submitted: May 18, 2011
  • Dangers of It

    Dangers of It

    Possible dangers and solutions Within information technology it is important that people have an awareness of the various health and safety issues. Steps should also be taken towards preventing common problems rather than trying to cure them at a later date. Back problems Many computer users suffer serious back problems.

    Essay Length: 597 Words / 3 Pages
    Submitted: September 26, 2011
  • Dark Age of Camelot

    Dark Age of Camelot

    Dark Age of Camelot is a 3D medieval fantasy MMORPG that revolves around war between three realms following King Arthur's rule. DAoC includes both Player versus Environment and Realm versus Realm combat. Players can choose to adventure alone or join groups. Players may also join battlegroups, which are formed so

    Essay Length: 267 Words / 2 Pages
    Submitted: September 14, 2011
  • Data Mining

    Data Mining

    PVA Funding PVA – FUNDRAISING IDS 572 – DATA MINING ASSIGNMENT 2 Arati Singh Nirav Dedhia Sachin Pandey Table of Contents Contents Question 1: Data Analysis Question 2: Modelling Question 3: Classification under Asymmetric Response and Cost Question 1: Data Analysis 1. Data Statistics: The table 1 in the appendix

    Essay Length: 3,344 Words / 14 Pages
    Submitted: April 9, 2016
  • Data Security

    Data Security

    Follow any of the major news organization in the world and you will most likely hear information about how some company released customer data or had a security breach where information was stolen. Regardless of their size, all companies have information that needs to remain private. This sensitive data could

    Essay Length: 2,798 Words / 12 Pages
    Submitted: August 2, 2011
  • Data-Mining


    Assignment 2- Question 2 Question: Fit a seasonal model to the variable HSTARTS in the construction data set. Step 1: We selected the Construction dataset from the FETS Library. We selected the variable Housing starts. Step 2: Below is the graph of Housing starts. The graph clearly shows a seasonal

    Essay Length: 412 Words / 2 Pages
    Submitted: February 14, 2016
  • Database and Arrays

    Database and Arrays

    Explain the relationship between databases and complete data structures and how they are used. "A database consists of an organized collection of data for one or more multiple uses" ((n.d.). Retrieved from http://en.wikipedia.org/wiki/Database). Basically, databases consist of containers that store and collect data used for an application. The data can

    Essay Length: 857 Words / 4 Pages
    Submitted: June 27, 2011
  • Database Design

    Database Design

    Database design DBM 380 January 14, 2013 Database design Data base systems are being used in many types of businesses throughout the world today. According to the estimates, the number of databases in the world today exceeds 10 million (Kroenke & Auer, 2011). Where going to talk about what a

    Essay Length: 562 Words / 3 Pages
    Submitted: January 27, 2013
  • Database Environment

    Database Environment

    Database Environment Student: Karen Hope DBM-380 December 10, 2011 Database Environment Setting up database environments are extremely useful for companies to be able to track, retrieve, and store the necessary data needed for a business. A database environment is made up of five major parts which are hardware, software, people,

    Essay Length: 880 Words / 4 Pages
    Submitted: December 21, 2012
  • Database in an Organization - Relational Database Management System (rdbms)

    Database in an Organization - Relational Database Management System (rdbms)

    Databases in an Organization Databases in an organization have become common place and an essential tool for everyday office work. In Corporate America, Databases are used to electronically collect information and organize it so it can be easily managed, accessed and updated at any time. Database Managers in an organization

    Essay Length: 753 Words / 4 Pages
    Submitted: June 28, 2011
  • Database Memorandum

    Database Memorandum

    The major purpose of a database is to provide an information system (in its broadest sense) that utilizes it with the information the system needs according to its own requirements. A certain broad set of requirements refines this general goal. Certain general functional requirements need to be met in conjunction

    Essay Length: 704 Words / 3 Pages
    Submitted: August 15, 2011
  • Database Normalization

    Database Normalization

    DATABASE NORMALIZATION Daltrin Wardell DBM 380 October 9, 2011 ABSRACT In the following paper I plan to discuss how database normalization can divide incoming data into smaller yet more manageable data tables for a company named Huffman Trucking. Normalization of the database is most often seen as the most effective

    Essay Length: 677 Words / 3 Pages
    Submitted: May 25, 2012
  • Database Normalization Explanation

    Database Normalization Explanation

    Database normalization explanation The normalization level that I chose to use for my database was the 3NF level. This level of normalization was chosen because it would be easy enough to add and delete data to without any complications or problems in the database. This level of normalization states that

    Essay Length: 426 Words / 2 Pages
    Submitted: January 13, 2014
  • Dbm 380 Week 1 - the Database of the Art Museum

    Dbm 380 Week 1 - the Database of the Art Museum

    The Art Museum The Database of the Art Museum DBM/380 11/8/15 Shalini Devi Introduction The Art Museum currently has over 200 employees and 1000’s of pieces of art. The art museum previously kept track of their inventory through excel spreadsheets. The art museum desires to organize their employees and art

    Essay Length: 905 Words / 4 Pages
    Submitted: December 14, 2015
  • Dbms Subqueries

    Dbms Subqueries

    1. Find Carriers who have not delivered to more than 1 city (5 pts) SELECT C.CARRIER_NAME FROM CARRIER C WHERE EXISTS ( SELECT s1.carrier_name, count (DISTINCT s1.DESTINATION_CITY) CNT FROM shipment s1 WHERE S1.CARRIER_NAME = C.CARRIER_NAME GROUP BY s1.carrier_name HAVING CNT <= 1 ); C:\Users\Apex\AppData\Desktop\1.JPG 1. Find businesses who have never

    Essay Length: 391 Words / 2 Pages
    Submitted: March 21, 2017
  • De Beers Jeff Cunningham - Margaret Campbell

    De Beers Jeff Cunningham - Margaret Campbell

    Case Study & Questions: De Beers Jeff Cunningham/Margaret Campbell 1. What are the key problems facing De Beers? De Beers Marketing approach for entering the Asian Markets was based on Western Cultures and ideas and based on the concept of "a diamond is a gift of Love" (Engagement and marriage)...

    Essay Length: 1,642 Words / 7 Pages
    Submitted: March 3, 2013
  • Decision Support System

    Decision Support System

    Throughout this course we have been working with Microsoft Excel which is a very popular decision support system. First off, Excel has a model management component that allows users many different models to assess or represent situation. The user must choose a model for optimization, goal-seeking, statistical, or what-if scenarios.

    Essay Length: 325 Words / 2 Pages
    Submitted: October 31, 2012

Go to Page
Advanced Search